aboutsummaryrefslogtreecommitdiff
path: root/param-spec.txt
diff options
context:
space:
mode:
Diffstat (limited to 'param-spec.txt')
-rw-r--r--param-spec.txt81
1 files changed, 62 insertions, 19 deletions
diff --git a/param-spec.txt b/param-spec.txt
index b2882a6..67c809d 100644
--- a/param-spec.txt
+++ b/param-spec.txt
@@ -17,7 +17,6 @@ Table of Contents
9. Denial-of-service parameters
10. Padding-related parameters
11. Guard-related parameters
- 12. Relay behavior
X. Obsolete parameters
1. Network protocol parameters
@@ -83,7 +82,7 @@ Table of Contents
"perconnbwrate" and "perconnbwburst" -- if set, each relay sets up a
separate token bucket for every client OR connection, and rate limits
- that connection indepedently. Typically left unset, except when used for
+ that connection independently. Typically left unset, except when used for
performance experiments around trac entry 1750. Only honored by relays
running Tor 0.2.2.16-alpha and later. (Note that relays running
0.2.2.7-alpha through 0.2.2.14-alpha looked for bwconnrate and
@@ -191,6 +190,62 @@ Table of Contents
Min: 0. Max: 1. Default: 0.
First-appeared: 0.2.3.11-alpha
+ "overload_dns_timeout_scale_percent" -- This value is a percentage of how
+ many DNS timeout over N seconds we accept before reporting the overload
+ general state. It is scaled by a factor of 1000 in order to be able to
+ represent decimal point. As an example, a value of 1000 means 1%.
+ Min: 0. Max: 100000. Default: 1000.
+ First-appeared: 0.4.6.8
+ Deprecated: 0.4.7.3-alpha-dev
+
+ "overload_dns_timeout_period_secs" -- This value is the period in seconds
+ of the DNS timeout measurements (the N in the
+ "overload_dns_timeout_scale_percent" parameter). For this amount of
+ seconds, we will gather DNS statistics and at the end, we'll do an
+ assessment on the overload general signal with regards to DNS timeouts.
+ Min: 0. Max: 2147483647. Default: 600
+ First-appeared: 0.4.6.8
+ Deprecated: 0.4.7.3-alpha-dev
+
+ "overload_onionskin_ntor_scale_percent" -- This value is a percentage of
+ how many onionskin ntor drop over N seconds we accept before reporting the
+ overload general state. It is scaled by a factor of 1000 in order to be
+ able to represent decimal point. As an example, a value of 1000 means 1%.
+ Min: 0. Max: 100000. Default: 1000.
+ First-appeared: 0.4.7.5-alpha
+
+ "overload_onionskin_ntor_period_secs" -- This value is the period in
+ seconds of the onionskin ntor overload measurements (the N in the
+ "overload_onionskin_ntor_scale_percent" parameter). For this amount of
+ seconds, we will gather onionskin ntor statistics and at the end, we'll do
+ an assessment on the overload general signal.
+ Min: 0. Max: 2147483647. Default: 21600 (6 hours)
+ First-appeared: 0.4.7.5-alpha
+
+ "assume-reachable" -- If true, relays should publish descriptors
+ even when they cannot make a connection to their IPv4 ORPort.
+ Min: 0. Max: 1. Default: 0.
+ First appeared: 0.4.5.1-alpha.
+
+ "assume-reachable-ipv6" -- If true, relays should publish
+ descriptors even when they cannot make a connection to their IPv6
+ ORPort.
+ Min: 0. Max: 1. Default: 0.
+ First appeared: 0.4.5.1-alpha.
+
+ "exit_dns_timeout" -- The time in milliseconds an Exit sets libevent to
+ wait before it considers the DNS timed out. The corresponding libevent
+ option is "timeout:".
+ Min: 1. Max: 120000. Default: 1000 (1sec)
+ First appeared: 0.4.7.5-alpha.
+
+ "exit_dns_num_attempts" -- How many attempts _after the first_ should an
+ Exit should try a timing-out DNS query before calling it hopeless? (Each of
+ these attempts will wait for "exit_dns_timeout" independently). The
+ corresponding libevent option is "attempts:".
+ Min: 0. Max: 255. Default: 2
+ First appeared: 0.4.7.5-alpha.
+
8. V3 onion service parameters
"hs_intro_min_introduce2", "hs_intro_max_introduce2" --
@@ -324,7 +379,7 @@ Table of Contents
Min: 0. Max: 1. Default: 0.
First appeared: 0.2.6
- "guard-lifetime-days" -- Controls guard lifetime. If a unconfirmed
+ "guard-lifetime-days" -- Controls guard lifetime. If an unconfirmed
guard has been sampled more than this many days ago, it should be
removed from the guard sample.
Min: 1. Max: 3650. Default: 120.
@@ -363,8 +418,9 @@ Table of Contents
"guard-extreme-restriction-percent" -- Warn the user if they have
configured tor to exclude so many guards that the available guard
bandwidth is less than this percentage of the total.
- Min: 1. Max: INT32_MAX. Default: 1.
- First appeared: 0.3.0
+ Min: 1. Max: 100. Default: 1.
+ First appeared: 0.3.0. MAX was INT32_MAX, which would have no meaningful
+ effect. MAX lowered to 100 in 0.4.7.
"guard-min-filtered-sample-size" -- If fewer than this number of
guards is available in the sample after filtering out unusable
@@ -394,7 +450,7 @@ Table of Contents
Min: 1. Max: INT32_MAX. Default: 15
First appeared: 0.3.0
- "guard-nonprimary-guard-idle-timeout" -- When trying to confirm
+ "guard-nonprimary-guard-idle-timeout" -- When trying to confirm
nonprimary guards, if a guard doesn't answer for more than this long
in seconds, treat it as down.
Min: 1. Max: INT32_MAX. Default: 600
@@ -406,19 +462,6 @@ Table of Contents
Min: 1. Max: 3650. Default: 20.
First appeared: 0.3.0
-12. Relay behavior
-
- "assume-reachable" -- If true, relays should publish descriptors
- even when they cannot make a connection to their IPv4 ORPort.
- Min: 0. Max: 1. Default: 0.
- First appeared: 0.4.5.1-alpha.
-
- "assume-reachable-ipv6" -- If true, relays should publish
- descriptors even when they cannot make a connection to their IPv6
- ORPort.
- Min: 0. Max: 1. Default: 0.
- First appeared: 0.4.5.1-alpha.
-
X. Obsolete parameters
"NumDirectoryGuards", "NumEntryGuards" -- Number of guard nodes